Dakshita Khurana
Dakshita Khurana
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
452016
Distinguisher-dependent simulation in two rounds and its applications
A Jain, YT Kalai, D Khurana, R Rothblum
Annual International Cryptology Conference, 158-189, 2017
422017
How to achieve non-malleability in one or two rounds
D Khurana, A Sahai
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS …, 2017
32*2017
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness.
P Ananth, A Jain, D Khurana, A Sahai
IACR Cryptol. ePrint Arch. 2018, 615, 2018
302018
Promise zero knowledge and its applications to round optimal MPC
S Badrinarayanan, V Goyal, A Jain, YT Kalai, D Khurana, A Sahai
Annual International Cryptology Conference, 459-487, 2018
292018
Statistical witness indistinguishability (and more) in two messages
YT Kalai, D Khurana, A Sahai
Annual International Conference on the Theory and Applications of …, 2018
222018
Round optimal concurrent non-malleability from polynomial hardness
D Khurana
Theory of Cryptography Conference, 139-171, 2017
202017
Round optimal concurrent MPC via strong simulation
S Badrinarayanan, V Goyal, A Jain, D Khurana, A Sahai
Theory of Cryptography Conference, 743-775, 2017
202017
Non-Interactive Delegation for Low-Space Non-Deterministic Computation.
S Badrinarayanan, YT Kalai, D Khurana, A Sahai, D Wichs
Electronic Colloquium on Computational Complexity (ECCC) 25, 9, 2018
18*2018
Breaking the three round barrier for non-malleable commitments
V Goyal, D Khurana, A Sahai
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 21-30, 2016
162016
Weak zero-knowledge beyond the black-box barrier
N Bitansky, D Khurana, O Paneth
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
142019
Do distributed differentially-private protocols require oblivious transfer?
V Goyal, D Khurana, I Mironov, O Pandey, A Sahai
43rd International Colloquium on Automata, Languages, and Programming (ICALP …, 2016
122016
Statistical zap arguments
S Badrinarayanan, R Fernando, A Jain, D Khurana, A Sahai
Annual International Conference on the Theory and Applications of …, 2020
92020
Unconditional UC-secure computation with (stronger-malicious) PUFs
S Badrinarayanan, D Khurana, R Ostrovsky, I Visconti
Annual International Conference on the Theory and Applications of …, 2017
82017
Multi-party key exchange for unbounded parties from indistinguishability obfuscation
D Khurana, V Rao, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2015
82015
Statistical Randomized Encodings: A Complexity Theoretic View
S Agrawal, Y Ishai, D Khurana, A Paskin-Cherniavsky
82015
Secure computation from elastic noisy channels
D Khurana, HK Maji, A Sahai
Annual International Conference on the Theory and Applications of …, 2016
72016
Black-box separations for differentially private protocols
D Khurana, HK Maji, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2014
72014
Non-malleable multi-prover interactive proofs and witness signatures
V Goyal, A Jain, D Khurana
Cryptology ePrint Archive, Report 2015/1095, 2015
52015
Non-interactive non-malleability from quantum supremacy
YT Kalai, D Khurana
Annual International Cryptology Conference, 552-582, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20